mirror of
https://github.com/router-for-me/CLIProxyAPIPlus.git
synced 2026-04-26 06:16:12 +00:00
Compare commits
49 Commits
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
58d45b4d58 | ||
|
|
1906ebcfce | ||
|
|
d47b7dc79a | ||
|
|
49b9709ce5 | ||
|
|
a2eba2cdf5 | ||
|
|
3d01b3cfe8 | ||
|
|
af2efa6f7e | ||
|
|
d73b61d367 | ||
|
|
d3533f81fc | ||
|
|
59a448b645 | ||
|
|
3de7a7f0cd | ||
|
|
4adb9eed77 | ||
|
|
b6a0f7a07f | ||
|
|
b2566368f8 | ||
|
|
1b2f907671 | ||
|
|
bda04eed8a | ||
|
|
e0735977b5 | ||
|
|
67985d8226 | ||
|
|
cbcb061812 | ||
|
|
9fc2e1b3c8 | ||
|
|
3b484aea9e | ||
|
|
963a0950fa | ||
|
|
1fb4f2b12e | ||
|
|
f4ba1ab910 | ||
|
|
2662f91082 | ||
|
|
f5967069f2 | ||
|
|
80f5523685 | ||
|
|
c1db2c7d7c | ||
|
|
5e5d8142f9 | ||
|
|
b01619b441 | ||
|
|
109cf3928a | ||
|
|
4794645dec | ||
|
|
f861bd6a94 | ||
|
|
6dbfdd140d | ||
|
|
386ccffed4 | ||
|
|
ffddd1c90a | ||
|
|
8f8dfd081b | ||
|
|
9f1b445c7c | ||
|
|
ae933dfe14 | ||
|
|
821249a5ed | ||
|
|
6762e081f3 | ||
|
|
414db44c00 | ||
|
|
cb3bdffb43 | ||
|
|
48f19aab51 | ||
|
|
48f6d7abdf | ||
|
|
79fbcb3ec4 | ||
|
|
0e4148b229 | ||
|
|
31bd90c748 | ||
|
|
0b834fcb54 |
@@ -33,6 +33,13 @@ var geminiOAuthScopes = []string{
|
|||||||
"https://www.googleapis.com/auth/userinfo.profile",
|
"https://www.googleapis.com/auth/userinfo.profile",
|
||||||
}
|
}
|
||||||
|
|
||||||
|
const (
|
||||||
|
antigravityOAuthClientID = "1071006060591-tmhssin2h21lcre235vtolojh4g403ep.apps.googleusercontent.com"
|
||||||
|
antigravityOAuthClientSecret = "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"
|
||||||
|
)
|
||||||
|
|
||||||
|
var antigravityOAuthTokenURL = "https://oauth2.googleapis.com/token"
|
||||||
|
|
||||||
type apiCallRequest struct {
|
type apiCallRequest struct {
|
||||||
AuthIndexSnake *string `json:"auth_index"`
|
AuthIndexSnake *string `json:"auth_index"`
|
||||||
AuthIndexCamel *string `json:"authIndex"`
|
AuthIndexCamel *string `json:"authIndex"`
|
||||||
@@ -251,6 +258,10 @@ func (h *Handler) resolveTokenForAuth(ctx context.Context, auth *coreauth.Auth)
|
|||||||
token, errToken := h.refreshGeminiOAuthAccessToken(ctx, auth)
|
token, errToken := h.refreshGeminiOAuthAccessToken(ctx, auth)
|
||||||
return token, errToken
|
return token, errToken
|
||||||
}
|
}
|
||||||
|
if provider == "antigravity" {
|
||||||
|
token, errToken := h.refreshAntigravityOAuthAccessToken(ctx, auth)
|
||||||
|
return token, errToken
|
||||||
|
}
|
||||||
|
|
||||||
return tokenValueForAuth(auth), nil
|
return tokenValueForAuth(auth), nil
|
||||||
}
|
}
|
||||||
@@ -325,6 +336,161 @@ func (h *Handler) refreshGeminiOAuthAccessToken(ctx context.Context, auth *corea
|
|||||||
return strings.TrimSpace(currentToken.AccessToken), nil
|
return strings.TrimSpace(currentToken.AccessToken), nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func (h *Handler) refreshAntigravityOAuthAccessToken(ctx context.Context, auth *coreauth.Auth) (string, error) {
|
||||||
|
if ctx == nil {
|
||||||
|
ctx = context.Background()
|
||||||
|
}
|
||||||
|
if auth == nil {
|
||||||
|
return "", nil
|
||||||
|
}
|
||||||
|
|
||||||
|
metadata := auth.Metadata
|
||||||
|
if len(metadata) == 0 {
|
||||||
|
return "", fmt.Errorf("antigravity oauth metadata missing")
|
||||||
|
}
|
||||||
|
|
||||||
|
current := strings.TrimSpace(tokenValueFromMetadata(metadata))
|
||||||
|
if current != "" && !antigravityTokenNeedsRefresh(metadata) {
|
||||||
|
return current, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
refreshToken := stringValue(metadata, "refresh_token")
|
||||||
|
if refreshToken == "" {
|
||||||
|
return "", fmt.Errorf("antigravity refresh token missing")
|
||||||
|
}
|
||||||
|
|
||||||
|
tokenURL := strings.TrimSpace(antigravityOAuthTokenURL)
|
||||||
|
if tokenURL == "" {
|
||||||
|
tokenURL = "https://oauth2.googleapis.com/token"
|
||||||
|
}
|
||||||
|
form := url.Values{}
|
||||||
|
form.Set("client_id", antigravityOAuthClientID)
|
||||||
|
form.Set("client_secret", antigravityOAuthClientSecret)
|
||||||
|
form.Set("grant_type", "refresh_token")
|
||||||
|
form.Set("refresh_token", refreshToken)
|
||||||
|
|
||||||
|
req, errReq := http.NewRequestWithContext(ctx, http.MethodPost, tokenURL, strings.NewReader(form.Encode()))
|
||||||
|
if errReq != nil {
|
||||||
|
return "", errReq
|
||||||
|
}
|
||||||
|
req.Header.Set("Content-Type", "application/x-www-form-urlencoded")
|
||||||
|
|
||||||
|
httpClient := &http.Client{
|
||||||
|
Timeout: defaultAPICallTimeout,
|
||||||
|
Transport: h.apiCallTransport(auth),
|
||||||
|
}
|
||||||
|
resp, errDo := httpClient.Do(req)
|
||||||
|
if errDo != nil {
|
||||||
|
return "", errDo
|
||||||
|
}
|
||||||
|
defer func() {
|
||||||
|
if errClose := resp.Body.Close(); errClose != nil {
|
||||||
|
log.Errorf("response body close error: %v", errClose)
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
|
||||||
|
bodyBytes, errRead := io.ReadAll(resp.Body)
|
||||||
|
if errRead != nil {
|
||||||
|
return "", errRead
|
||||||
|
}
|
||||||
|
if resp.StatusCode < http.StatusOK || resp.StatusCode >= http.StatusMultipleChoices {
|
||||||
|
return "", fmt.Errorf("antigravity oauth token refresh failed: status %d: %s", resp.StatusCode, strings.TrimSpace(string(bodyBytes)))
|
||||||
|
}
|
||||||
|
|
||||||
|
var tokenResp struct {
|
||||||
|
AccessToken string `json:"access_token"`
|
||||||
|
RefreshToken string `json:"refresh_token"`
|
||||||
|
ExpiresIn int64 `json:"expires_in"`
|
||||||
|
TokenType string `json:"token_type"`
|
||||||
|
}
|
||||||
|
if errUnmarshal := json.Unmarshal(bodyBytes, &tokenResp); errUnmarshal != nil {
|
||||||
|
return "", errUnmarshal
|
||||||
|
}
|
||||||
|
|
||||||
|
if strings.TrimSpace(tokenResp.AccessToken) == "" {
|
||||||
|
return "", fmt.Errorf("antigravity oauth token refresh returned empty access_token")
|
||||||
|
}
|
||||||
|
|
||||||
|
if auth.Metadata == nil {
|
||||||
|
auth.Metadata = make(map[string]any)
|
||||||
|
}
|
||||||
|
now := time.Now()
|
||||||
|
auth.Metadata["access_token"] = strings.TrimSpace(tokenResp.AccessToken)
|
||||||
|
if strings.TrimSpace(tokenResp.RefreshToken) != "" {
|
||||||
|
auth.Metadata["refresh_token"] = strings.TrimSpace(tokenResp.RefreshToken)
|
||||||
|
}
|
||||||
|
if tokenResp.ExpiresIn > 0 {
|
||||||
|
auth.Metadata["expires_in"] = tokenResp.ExpiresIn
|
||||||
|
auth.Metadata["timestamp"] = now.UnixMilli()
|
||||||
|
auth.Metadata["expired"] = now.Add(time.Duration(tokenResp.ExpiresIn) * time.Second).Format(time.RFC3339)
|
||||||
|
}
|
||||||
|
auth.Metadata["type"] = "antigravity"
|
||||||
|
|
||||||
|
if h != nil && h.authManager != nil {
|
||||||
|
auth.LastRefreshedAt = now
|
||||||
|
auth.UpdatedAt = now
|
||||||
|
_, _ = h.authManager.Update(ctx, auth)
|
||||||
|
}
|
||||||
|
|
||||||
|
return strings.TrimSpace(tokenResp.AccessToken), nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func antigravityTokenNeedsRefresh(metadata map[string]any) bool {
|
||||||
|
// Refresh a bit early to avoid requests racing token expiry.
|
||||||
|
const skew = 30 * time.Second
|
||||||
|
|
||||||
|
if metadata == nil {
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
if expStr, ok := metadata["expired"].(string); ok {
|
||||||
|
if ts, errParse := time.Parse(time.RFC3339, strings.TrimSpace(expStr)); errParse == nil {
|
||||||
|
return !ts.After(time.Now().Add(skew))
|
||||||
|
}
|
||||||
|
}
|
||||||
|
expiresIn := int64Value(metadata["expires_in"])
|
||||||
|
timestampMs := int64Value(metadata["timestamp"])
|
||||||
|
if expiresIn > 0 && timestampMs > 0 {
|
||||||
|
exp := time.UnixMilli(timestampMs).Add(time.Duration(expiresIn) * time.Second)
|
||||||
|
return !exp.After(time.Now().Add(skew))
|
||||||
|
}
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
|
||||||
|
func int64Value(raw any) int64 {
|
||||||
|
switch typed := raw.(type) {
|
||||||
|
case int:
|
||||||
|
return int64(typed)
|
||||||
|
case int32:
|
||||||
|
return int64(typed)
|
||||||
|
case int64:
|
||||||
|
return typed
|
||||||
|
case uint:
|
||||||
|
return int64(typed)
|
||||||
|
case uint32:
|
||||||
|
return int64(typed)
|
||||||
|
case uint64:
|
||||||
|
if typed > uint64(^uint64(0)>>1) {
|
||||||
|
return 0
|
||||||
|
}
|
||||||
|
return int64(typed)
|
||||||
|
case float32:
|
||||||
|
return int64(typed)
|
||||||
|
case float64:
|
||||||
|
return int64(typed)
|
||||||
|
case json.Number:
|
||||||
|
if i, errParse := typed.Int64(); errParse == nil {
|
||||||
|
return i
|
||||||
|
}
|
||||||
|
case string:
|
||||||
|
if s := strings.TrimSpace(typed); s != "" {
|
||||||
|
if i, errParse := json.Number(s).Int64(); errParse == nil {
|
||||||
|
return i
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return 0
|
||||||
|
}
|
||||||
|
|
||||||
func geminiOAuthMetadata(auth *coreauth.Auth) (map[string]any, func(map[string]any)) {
|
func geminiOAuthMetadata(auth *coreauth.Auth) (map[string]any, func(map[string]any)) {
|
||||||
if auth == nil {
|
if auth == nil {
|
||||||
return nil, nil
|
return nil, nil
|
||||||
|
|||||||
173
internal/api/handlers/management/api_tools_test.go
Normal file
173
internal/api/handlers/management/api_tools_test.go
Normal file
@@ -0,0 +1,173 @@
|
|||||||
|
package management
|
||||||
|
|
||||||
|
import (
|
||||||
|
"context"
|
||||||
|
"encoding/json"
|
||||||
|
"io"
|
||||||
|
"net/http"
|
||||||
|
"net/http/httptest"
|
||||||
|
"net/url"
|
||||||
|
"strings"
|
||||||
|
"sync"
|
||||||
|
"testing"
|
||||||
|
"time"
|
||||||
|
|
||||||
|
coreauth "github.com/router-for-me/CLIProxyAPI/v6/sdk/cliproxy/auth"
|
||||||
|
)
|
||||||
|
|
||||||
|
type memoryAuthStore struct {
|
||||||
|
mu sync.Mutex
|
||||||
|
items map[string]*coreauth.Auth
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *memoryAuthStore) List(ctx context.Context) ([]*coreauth.Auth, error) {
|
||||||
|
_ = ctx
|
||||||
|
s.mu.Lock()
|
||||||
|
defer s.mu.Unlock()
|
||||||
|
out := make([]*coreauth.Auth, 0, len(s.items))
|
||||||
|
for _, a := range s.items {
|
||||||
|
out = append(out, a.Clone())
|
||||||
|
}
|
||||||
|
return out, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *memoryAuthStore) Save(ctx context.Context, auth *coreauth.Auth) (string, error) {
|
||||||
|
_ = ctx
|
||||||
|
if auth == nil {
|
||||||
|
return "", nil
|
||||||
|
}
|
||||||
|
s.mu.Lock()
|
||||||
|
if s.items == nil {
|
||||||
|
s.items = make(map[string]*coreauth.Auth)
|
||||||
|
}
|
||||||
|
s.items[auth.ID] = auth.Clone()
|
||||||
|
s.mu.Unlock()
|
||||||
|
return auth.ID, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *memoryAuthStore) Delete(ctx context.Context, id string) error {
|
||||||
|
_ = ctx
|
||||||
|
s.mu.Lock()
|
||||||
|
delete(s.items, id)
|
||||||
|
s.mu.Unlock()
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestResolveTokenForAuth_Antigravity_RefreshesExpiredToken(t *testing.T) {
|
||||||
|
var callCount int
|
||||||
|
srv := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
||||||
|
callCount++
|
||||||
|
if r.Method != http.MethodPost {
|
||||||
|
t.Fatalf("expected POST, got %s", r.Method)
|
||||||
|
}
|
||||||
|
if ct := r.Header.Get("Content-Type"); !strings.HasPrefix(ct, "application/x-www-form-urlencoded") {
|
||||||
|
t.Fatalf("unexpected content-type: %s", ct)
|
||||||
|
}
|
||||||
|
bodyBytes, _ := io.ReadAll(r.Body)
|
||||||
|
_ = r.Body.Close()
|
||||||
|
values, err := url.ParseQuery(string(bodyBytes))
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("parse form: %v", err)
|
||||||
|
}
|
||||||
|
if values.Get("grant_type") != "refresh_token" {
|
||||||
|
t.Fatalf("unexpected grant_type: %s", values.Get("grant_type"))
|
||||||
|
}
|
||||||
|
if values.Get("refresh_token") != "rt" {
|
||||||
|
t.Fatalf("unexpected refresh_token: %s", values.Get("refresh_token"))
|
||||||
|
}
|
||||||
|
if values.Get("client_id") != antigravityOAuthClientID {
|
||||||
|
t.Fatalf("unexpected client_id: %s", values.Get("client_id"))
|
||||||
|
}
|
||||||
|
if values.Get("client_secret") != antigravityOAuthClientSecret {
|
||||||
|
t.Fatalf("unexpected client_secret")
|
||||||
|
}
|
||||||
|
|
||||||
|
w.Header().Set("Content-Type", "application/json")
|
||||||
|
_ = json.NewEncoder(w).Encode(map[string]any{
|
||||||
|
"access_token": "new-token",
|
||||||
|
"refresh_token": "rt2",
|
||||||
|
"expires_in": int64(3600),
|
||||||
|
"token_type": "Bearer",
|
||||||
|
})
|
||||||
|
}))
|
||||||
|
t.Cleanup(srv.Close)
|
||||||
|
|
||||||
|
originalURL := antigravityOAuthTokenURL
|
||||||
|
antigravityOAuthTokenURL = srv.URL
|
||||||
|
t.Cleanup(func() { antigravityOAuthTokenURL = originalURL })
|
||||||
|
|
||||||
|
store := &memoryAuthStore{}
|
||||||
|
manager := coreauth.NewManager(store, nil, nil)
|
||||||
|
|
||||||
|
auth := &coreauth.Auth{
|
||||||
|
ID: "antigravity-test.json",
|
||||||
|
FileName: "antigravity-test.json",
|
||||||
|
Provider: "antigravity",
|
||||||
|
Metadata: map[string]any{
|
||||||
|
"type": "antigravity",
|
||||||
|
"access_token": "old-token",
|
||||||
|
"refresh_token": "rt",
|
||||||
|
"expires_in": int64(3600),
|
||||||
|
"timestamp": time.Now().Add(-2 * time.Hour).UnixMilli(),
|
||||||
|
"expired": time.Now().Add(-1 * time.Hour).Format(time.RFC3339),
|
||||||
|
},
|
||||||
|
}
|
||||||
|
if _, err := manager.Register(context.Background(), auth); err != nil {
|
||||||
|
t.Fatalf("register auth: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
h := &Handler{authManager: manager}
|
||||||
|
token, err := h.resolveTokenForAuth(context.Background(), auth)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("resolveTokenForAuth: %v", err)
|
||||||
|
}
|
||||||
|
if token != "new-token" {
|
||||||
|
t.Fatalf("expected refreshed token, got %q", token)
|
||||||
|
}
|
||||||
|
if callCount != 1 {
|
||||||
|
t.Fatalf("expected 1 refresh call, got %d", callCount)
|
||||||
|
}
|
||||||
|
|
||||||
|
updated, ok := manager.GetByID(auth.ID)
|
||||||
|
if !ok || updated == nil {
|
||||||
|
t.Fatalf("expected auth in manager after update")
|
||||||
|
}
|
||||||
|
if got := tokenValueFromMetadata(updated.Metadata); got != "new-token" {
|
||||||
|
t.Fatalf("expected manager metadata updated, got %q", got)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestResolveTokenForAuth_Antigravity_SkipsRefreshWhenTokenValid(t *testing.T) {
|
||||||
|
var callCount int
|
||||||
|
srv := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
|
||||||
|
callCount++
|
||||||
|
w.WriteHeader(http.StatusInternalServerError)
|
||||||
|
}))
|
||||||
|
t.Cleanup(srv.Close)
|
||||||
|
|
||||||
|
originalURL := antigravityOAuthTokenURL
|
||||||
|
antigravityOAuthTokenURL = srv.URL
|
||||||
|
t.Cleanup(func() { antigravityOAuthTokenURL = originalURL })
|
||||||
|
|
||||||
|
auth := &coreauth.Auth{
|
||||||
|
ID: "antigravity-valid.json",
|
||||||
|
FileName: "antigravity-valid.json",
|
||||||
|
Provider: "antigravity",
|
||||||
|
Metadata: map[string]any{
|
||||||
|
"type": "antigravity",
|
||||||
|
"access_token": "ok-token",
|
||||||
|
"expired": time.Now().Add(30 * time.Minute).Format(time.RFC3339),
|
||||||
|
},
|
||||||
|
}
|
||||||
|
h := &Handler{}
|
||||||
|
token, err := h.resolveTokenForAuth(context.Background(), auth)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatalf("resolveTokenForAuth: %v", err)
|
||||||
|
}
|
||||||
|
if token != "ok-token" {
|
||||||
|
t.Fatalf("expected existing token, got %q", token)
|
||||||
|
}
|
||||||
|
if callCount != 0 {
|
||||||
|
t.Fatalf("expected no refresh calls, got %d", callCount)
|
||||||
|
}
|
||||||
|
}
|
||||||
@@ -125,7 +125,32 @@ func (rw *ResponseRewriter) Flush() {
|
|||||||
var modelFieldPaths = []string{"model", "modelVersion", "response.modelVersion", "message.model"}
|
var modelFieldPaths = []string{"model", "modelVersion", "response.modelVersion", "message.model"}
|
||||||
|
|
||||||
// rewriteModelInResponse replaces all occurrences of the mapped model with the original model in JSON
|
// rewriteModelInResponse replaces all occurrences of the mapped model with the original model in JSON
|
||||||
|
// It also suppresses "thinking" blocks if "tool_use" is present to ensure Amp client compatibility
|
||||||
func (rw *ResponseRewriter) rewriteModelInResponse(data []byte) []byte {
|
func (rw *ResponseRewriter) rewriteModelInResponse(data []byte) []byte {
|
||||||
|
// 1. Amp Compatibility: Suppress thinking blocks if tool use is detected
|
||||||
|
// The Amp client struggles when both thinking and tool_use blocks are present
|
||||||
|
// 1. Amp Compatibility: Suppress thinking blocks if tool use is detected
|
||||||
|
// The Amp client struggles when both thinking and tool_use blocks are present
|
||||||
|
if gjson.GetBytes(data, `content.#(type=="tool_use")`).Exists() {
|
||||||
|
filtered := gjson.GetBytes(data, `content.#(type!="thinking")#`)
|
||||||
|
if filtered.Exists() {
|
||||||
|
originalCount := gjson.GetBytes(data, "content.#").Int()
|
||||||
|
filteredCount := filtered.Get("#").Int()
|
||||||
|
|
||||||
|
if originalCount > filteredCount {
|
||||||
|
var err error
|
||||||
|
data, err = sjson.SetBytes(data, "content", filtered.Value())
|
||||||
|
if err != nil {
|
||||||
|
log.Warnf("Amp ResponseRewriter: failed to suppress thinking blocks: %v", err)
|
||||||
|
} else {
|
||||||
|
log.Debugf("Amp ResponseRewriter: Suppressed %d thinking blocks due to tool usage", originalCount-filteredCount)
|
||||||
|
// Log the result for verification
|
||||||
|
log.Debugf("Amp ResponseRewriter: Resulting content: %s", gjson.GetBytes(data, "content").String())
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
if rw.originalModel == "" {
|
if rw.originalModel == "" {
|
||||||
return data
|
return data
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -45,7 +45,7 @@ const (
|
|||||||
defaultAntigravityAgent = "antigravity/1.104.0 darwin/arm64"
|
defaultAntigravityAgent = "antigravity/1.104.0 darwin/arm64"
|
||||||
antigravityAuthType = "antigravity"
|
antigravityAuthType = "antigravity"
|
||||||
refreshSkew = 3000 * time.Second
|
refreshSkew = 3000 * time.Second
|
||||||
tokenRefreshTimeout = 30 * time.Second
|
systemInstruction = "You are Antigravity, a powerful agentic AI coding assistant designed by the Google Deepmind team working on Advanced Agentic Coding.You are pair programming with a USER to solve their coding task. The task may require creating a new codebase, modifying or debugging an existing codebase, or simply answering a question.**Absolute paths only****Proactiveness**"
|
||||||
)
|
)
|
||||||
|
|
||||||
var (
|
var (
|
||||||
@@ -78,7 +78,7 @@ func (e *AntigravityExecutor) PrepareRequest(_ *http.Request, _ *cliproxyauth.Au
|
|||||||
// Execute performs a non-streaming request to the Antigravity API.
|
// Execute performs a non-streaming request to the Antigravity API.
|
||||||
func (e *AntigravityExecutor) Execute(ctx context.Context, auth *cliproxyauth.Auth, req cliproxyexecutor.Request, opts cliproxyexecutor.Options) (resp cliproxyexecutor.Response, err error) {
|
func (e *AntigravityExecutor) Execute(ctx context.Context, auth *cliproxyauth.Auth, req cliproxyexecutor.Request, opts cliproxyexecutor.Options) (resp cliproxyexecutor.Response, err error) {
|
||||||
isClaude := strings.Contains(strings.ToLower(req.Model), "claude")
|
isClaude := strings.Contains(strings.ToLower(req.Model), "claude")
|
||||||
if isClaude {
|
if isClaude || strings.Contains(req.Model, "gemini-3-pro") {
|
||||||
return e.executeClaudeNonStream(ctx, auth, req, opts)
|
return e.executeClaudeNonStream(ctx, auth, req, opts)
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -157,7 +157,13 @@ func (e *AntigravityExecutor) Execute(ctx context.Context, auth *cliproxyauth.Au
|
|||||||
log.Debugf("antigravity executor: rate limited on base url %s, retrying with fallback base url: %s", baseURL, baseURLs[idx+1])
|
log.Debugf("antigravity executor: rate limited on base url %s, retrying with fallback base url: %s", baseURL, baseURLs[idx+1])
|
||||||
continue
|
continue
|
||||||
}
|
}
|
||||||
err = statusErr{code: httpResp.StatusCode, msg: string(bodyBytes)}
|
sErr := statusErr{code: httpResp.StatusCode, msg: string(bodyBytes)}
|
||||||
|
if httpResp.StatusCode == http.StatusTooManyRequests {
|
||||||
|
if retryAfter, parseErr := parseRetryDelay(bodyBytes); parseErr == nil && retryAfter != nil {
|
||||||
|
sErr.retryAfter = retryAfter
|
||||||
|
}
|
||||||
|
}
|
||||||
|
err = sErr
|
||||||
return resp, err
|
return resp, err
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -171,7 +177,13 @@ func (e *AntigravityExecutor) Execute(ctx context.Context, auth *cliproxyauth.Au
|
|||||||
|
|
||||||
switch {
|
switch {
|
||||||
case lastStatus != 0:
|
case lastStatus != 0:
|
||||||
err = statusErr{code: lastStatus, msg: string(lastBody)}
|
sErr := statusErr{code: lastStatus, msg: string(lastBody)}
|
||||||
|
if lastStatus == http.StatusTooManyRequests {
|
||||||
|
if retryAfter, parseErr := parseRetryDelay(lastBody); parseErr == nil && retryAfter != nil {
|
||||||
|
sErr.retryAfter = retryAfter
|
||||||
|
}
|
||||||
|
}
|
||||||
|
err = sErr
|
||||||
case lastErr != nil:
|
case lastErr != nil:
|
||||||
err = lastErr
|
err = lastErr
|
||||||
default:
|
default:
|
||||||
@@ -261,7 +273,13 @@ func (e *AntigravityExecutor) executeClaudeNonStream(ctx context.Context, auth *
|
|||||||
log.Debugf("antigravity executor: rate limited on base url %s, retrying with fallback base url: %s", baseURL, baseURLs[idx+1])
|
log.Debugf("antigravity executor: rate limited on base url %s, retrying with fallback base url: %s", baseURL, baseURLs[idx+1])
|
||||||
continue
|
continue
|
||||||
}
|
}
|
||||||
err = statusErr{code: httpResp.StatusCode, msg: string(bodyBytes)}
|
sErr := statusErr{code: httpResp.StatusCode, msg: string(bodyBytes)}
|
||||||
|
if httpResp.StatusCode == http.StatusTooManyRequests {
|
||||||
|
if retryAfter, parseErr := parseRetryDelay(bodyBytes); parseErr == nil && retryAfter != nil {
|
||||||
|
sErr.retryAfter = retryAfter
|
||||||
|
}
|
||||||
|
}
|
||||||
|
err = sErr
|
||||||
return resp, err
|
return resp, err
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -326,7 +344,13 @@ func (e *AntigravityExecutor) executeClaudeNonStream(ctx context.Context, auth *
|
|||||||
|
|
||||||
switch {
|
switch {
|
||||||
case lastStatus != 0:
|
case lastStatus != 0:
|
||||||
err = statusErr{code: lastStatus, msg: string(lastBody)}
|
sErr := statusErr{code: lastStatus, msg: string(lastBody)}
|
||||||
|
if lastStatus == http.StatusTooManyRequests {
|
||||||
|
if retryAfter, parseErr := parseRetryDelay(lastBody); parseErr == nil && retryAfter != nil {
|
||||||
|
sErr.retryAfter = retryAfter
|
||||||
|
}
|
||||||
|
}
|
||||||
|
err = sErr
|
||||||
case lastErr != nil:
|
case lastErr != nil:
|
||||||
err = lastErr
|
err = lastErr
|
||||||
default:
|
default:
|
||||||
@@ -602,7 +626,13 @@ func (e *AntigravityExecutor) ExecuteStream(ctx context.Context, auth *cliproxya
|
|||||||
log.Debugf("antigravity executor: rate limited on base url %s, retrying with fallback base url: %s", baseURL, baseURLs[idx+1])
|
log.Debugf("antigravity executor: rate limited on base url %s, retrying with fallback base url: %s", baseURL, baseURLs[idx+1])
|
||||||
continue
|
continue
|
||||||
}
|
}
|
||||||
err = statusErr{code: httpResp.StatusCode, msg: string(bodyBytes)}
|
sErr := statusErr{code: httpResp.StatusCode, msg: string(bodyBytes)}
|
||||||
|
if httpResp.StatusCode == http.StatusTooManyRequests {
|
||||||
|
if retryAfter, parseErr := parseRetryDelay(bodyBytes); parseErr == nil && retryAfter != nil {
|
||||||
|
sErr.retryAfter = retryAfter
|
||||||
|
}
|
||||||
|
}
|
||||||
|
err = sErr
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -657,7 +687,13 @@ func (e *AntigravityExecutor) ExecuteStream(ctx context.Context, auth *cliproxya
|
|||||||
|
|
||||||
switch {
|
switch {
|
||||||
case lastStatus != 0:
|
case lastStatus != 0:
|
||||||
err = statusErr{code: lastStatus, msg: string(lastBody)}
|
sErr := statusErr{code: lastStatus, msg: string(lastBody)}
|
||||||
|
if lastStatus == http.StatusTooManyRequests {
|
||||||
|
if retryAfter, parseErr := parseRetryDelay(lastBody); parseErr == nil && retryAfter != nil {
|
||||||
|
sErr.retryAfter = retryAfter
|
||||||
|
}
|
||||||
|
}
|
||||||
|
err = sErr
|
||||||
case lastErr != nil:
|
case lastErr != nil:
|
||||||
err = lastErr
|
err = lastErr
|
||||||
default:
|
default:
|
||||||
@@ -794,12 +830,24 @@ func (e *AntigravityExecutor) CountTokens(ctx context.Context, auth *cliproxyaut
|
|||||||
log.Debugf("antigravity executor: rate limited on base url %s, retrying with fallback base url: %s", baseURL, baseURLs[idx+1])
|
log.Debugf("antigravity executor: rate limited on base url %s, retrying with fallback base url: %s", baseURL, baseURLs[idx+1])
|
||||||
continue
|
continue
|
||||||
}
|
}
|
||||||
return cliproxyexecutor.Response{}, statusErr{code: httpResp.StatusCode, msg: string(bodyBytes)}
|
sErr := statusErr{code: httpResp.StatusCode, msg: string(bodyBytes)}
|
||||||
|
if httpResp.StatusCode == http.StatusTooManyRequests {
|
||||||
|
if retryAfter, parseErr := parseRetryDelay(bodyBytes); parseErr == nil && retryAfter != nil {
|
||||||
|
sErr.retryAfter = retryAfter
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return cliproxyexecutor.Response{}, sErr
|
||||||
}
|
}
|
||||||
|
|
||||||
switch {
|
switch {
|
||||||
case lastStatus != 0:
|
case lastStatus != 0:
|
||||||
return cliproxyexecutor.Response{}, statusErr{code: lastStatus, msg: string(lastBody)}
|
sErr := statusErr{code: lastStatus, msg: string(lastBody)}
|
||||||
|
if lastStatus == http.StatusTooManyRequests {
|
||||||
|
if retryAfter, parseErr := parseRetryDelay(lastBody); parseErr == nil && retryAfter != nil {
|
||||||
|
sErr.retryAfter = retryAfter
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return cliproxyexecutor.Response{}, sErr
|
||||||
case lastErr != nil:
|
case lastErr != nil:
|
||||||
return cliproxyexecutor.Response{}, lastErr
|
return cliproxyexecutor.Response{}, lastErr
|
||||||
default:
|
default:
|
||||||
@@ -951,7 +999,7 @@ func (e *AntigravityExecutor) refreshToken(ctx context.Context, auth *cliproxyau
|
|||||||
httpReq.Header.Set("User-Agent", defaultAntigravityAgent)
|
httpReq.Header.Set("User-Agent", defaultAntigravityAgent)
|
||||||
httpReq.Header.Set("Content-Type", "application/x-www-form-urlencoded")
|
httpReq.Header.Set("Content-Type", "application/x-www-form-urlencoded")
|
||||||
|
|
||||||
httpClient := newProxyAwareHTTPClient(ctx, e.cfg, auth, tokenRefreshTimeout)
|
httpClient := newProxyAwareHTTPClient(ctx, e.cfg, auth, 0)
|
||||||
httpResp, errDo := httpClient.Do(httpReq)
|
httpResp, errDo := httpClient.Do(httpReq)
|
||||||
if errDo != nil {
|
if errDo != nil {
|
||||||
return auth, errDo
|
return auth, errDo
|
||||||
@@ -968,7 +1016,13 @@ func (e *AntigravityExecutor) refreshToken(ctx context.Context, auth *cliproxyau
|
|||||||
}
|
}
|
||||||
|
|
||||||
if httpResp.StatusCode < http.StatusOK || httpResp.StatusCode >= http.StatusMultipleChoices {
|
if httpResp.StatusCode < http.StatusOK || httpResp.StatusCode >= http.StatusMultipleChoices {
|
||||||
return auth, statusErr{code: httpResp.StatusCode, msg: string(bodyBytes)}
|
sErr := statusErr{code: httpResp.StatusCode, msg: string(bodyBytes)}
|
||||||
|
if httpResp.StatusCode == http.StatusTooManyRequests {
|
||||||
|
if retryAfter, parseErr := parseRetryDelay(bodyBytes); parseErr == nil && retryAfter != nil {
|
||||||
|
sErr.retryAfter = retryAfter
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return auth, sErr
|
||||||
}
|
}
|
||||||
|
|
||||||
var tokenResp struct {
|
var tokenResp struct {
|
||||||
@@ -1048,6 +1102,19 @@ func (e *AntigravityExecutor) buildRequest(ctx context.Context, auth *cliproxyau
|
|||||||
payload = []byte(strJSON)
|
payload = []byte(strJSON)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
if strings.Contains(modelName, "claude") || strings.Contains(modelName, "gemini-3-pro-preview") {
|
||||||
|
systemInstructionPartsResult := gjson.GetBytes(payload, "request.systemInstruction.parts")
|
||||||
|
payload, _ = sjson.SetBytes(payload, "request.systemInstruction.role", "user")
|
||||||
|
payload, _ = sjson.SetBytes(payload, "request.systemInstruction.parts.0.text", systemInstruction)
|
||||||
|
payload, _ = sjson.SetBytes(payload, "request.systemInstruction.parts.1.text", fmt.Sprintf("Please ignore following [ignore]%s[/ignore]", systemInstruction))
|
||||||
|
|
||||||
|
if systemInstructionPartsResult.Exists() && systemInstructionPartsResult.IsArray() {
|
||||||
|
for _, partResult := range systemInstructionPartsResult.Array() {
|
||||||
|
payload, _ = sjson.SetRawBytes(payload, "request.systemInstruction.parts.-1", []byte(partResult.Raw))
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
httpReq, errReq := http.NewRequestWithContext(ctx, http.MethodPost, requestURL.String(), bytes.NewReader(payload))
|
httpReq, errReq := http.NewRequestWithContext(ctx, http.MethodPost, requestURL.String(), bytes.NewReader(payload))
|
||||||
if errReq != nil {
|
if errReq != nil {
|
||||||
return nil, errReq
|
return nil, errReq
|
||||||
@@ -1182,8 +1249,8 @@ func antigravityBaseURLFallbackOrder(auth *cliproxyauth.Auth) []string {
|
|||||||
return []string{base}
|
return []string{base}
|
||||||
}
|
}
|
||||||
return []string{
|
return []string{
|
||||||
antigravityBaseURLDaily,
|
|
||||||
antigravitySandboxBaseURLDaily,
|
antigravitySandboxBaseURLDaily,
|
||||||
|
antigravityBaseURLDaily,
|
||||||
antigravityBaseURLProd,
|
antigravityBaseURLProd,
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@@ -1211,6 +1278,7 @@ func resolveCustomAntigravityBaseURL(auth *cliproxyauth.Auth) string {
|
|||||||
func geminiToAntigravity(modelName string, payload []byte, projectID string) []byte {
|
func geminiToAntigravity(modelName string, payload []byte, projectID string) []byte {
|
||||||
template, _ := sjson.Set(string(payload), "model", modelName)
|
template, _ := sjson.Set(string(payload), "model", modelName)
|
||||||
template, _ = sjson.Set(template, "userAgent", "antigravity")
|
template, _ = sjson.Set(template, "userAgent", "antigravity")
|
||||||
|
template, _ = sjson.Set(template, "requestType", "agent")
|
||||||
|
|
||||||
// Use real project ID from auth if available, otherwise generate random (legacy fallback)
|
// Use real project ID from auth if available, otherwise generate random (legacy fallback)
|
||||||
if projectID != "" {
|
if projectID != "" {
|
||||||
|
|||||||
@@ -184,7 +184,7 @@ func ConvertOpenAIRequestToAntigravity(modelName string, inputRawJSON []byte, _
|
|||||||
role := m.Get("role").String()
|
role := m.Get("role").String()
|
||||||
content := m.Get("content")
|
content := m.Get("content")
|
||||||
|
|
||||||
if role == "system" && len(arr) > 1 {
|
if (role == "system" || role == "developer") && len(arr) > 1 {
|
||||||
// system -> request.systemInstruction as a user message style
|
// system -> request.systemInstruction as a user message style
|
||||||
if content.Type == gjson.String {
|
if content.Type == gjson.String {
|
||||||
out, _ = sjson.SetBytes(out, "request.systemInstruction.role", "user")
|
out, _ = sjson.SetBytes(out, "request.systemInstruction.role", "user")
|
||||||
@@ -201,7 +201,7 @@ func ConvertOpenAIRequestToAntigravity(modelName string, inputRawJSON []byte, _
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
} else if role == "user" || (role == "system" && len(arr) == 1) {
|
} else if role == "user" || ((role == "system" || role == "developer") && len(arr) == 1) {
|
||||||
// Build single user content node to avoid splitting into multiple contents
|
// Build single user content node to avoid splitting into multiple contents
|
||||||
node := []byte(`{"role":"user","parts":[]}`)
|
node := []byte(`{"role":"user","parts":[]}`)
|
||||||
if content.Type == gjson.String {
|
if content.Type == gjson.String {
|
||||||
|
|||||||
@@ -20,6 +20,12 @@ var (
|
|||||||
dataTag = []byte("data:")
|
dataTag = []byte("data:")
|
||||||
)
|
)
|
||||||
|
|
||||||
|
// ConvertCodexResponseToClaudeParams holds parameters for response conversion.
|
||||||
|
type ConvertCodexResponseToClaudeParams struct {
|
||||||
|
HasToolCall bool
|
||||||
|
BlockIndex int
|
||||||
|
}
|
||||||
|
|
||||||
// ConvertCodexResponseToClaude performs sophisticated streaming response format conversion.
|
// ConvertCodexResponseToClaude performs sophisticated streaming response format conversion.
|
||||||
// This function implements a complex state machine that translates Codex API responses
|
// This function implements a complex state machine that translates Codex API responses
|
||||||
// into Claude Code-compatible Server-Sent Events (SSE) format. It manages different response types
|
// into Claude Code-compatible Server-Sent Events (SSE) format. It manages different response types
|
||||||
@@ -38,8 +44,10 @@ var (
|
|||||||
// - []string: A slice of strings, each containing a Claude Code-compatible JSON response
|
// - []string: A slice of strings, each containing a Claude Code-compatible JSON response
|
||||||
func ConvertCodexResponseToClaude(_ context.Context, _ string, originalRequestRawJSON, requestRawJSON, rawJSON []byte, param *any) []string {
|
func ConvertCodexResponseToClaude(_ context.Context, _ string, originalRequestRawJSON, requestRawJSON, rawJSON []byte, param *any) []string {
|
||||||
if *param == nil {
|
if *param == nil {
|
||||||
hasToolCall := false
|
*param = &ConvertCodexResponseToClaudeParams{
|
||||||
*param = &hasToolCall
|
HasToolCall: false,
|
||||||
|
BlockIndex: 0,
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
// log.Debugf("rawJSON: %s", string(rawJSON))
|
// log.Debugf("rawJSON: %s", string(rawJSON))
|
||||||
@@ -62,46 +70,49 @@ func ConvertCodexResponseToClaude(_ context.Context, _ string, originalRequestRa
|
|||||||
output += fmt.Sprintf("data: %s\n\n", template)
|
output += fmt.Sprintf("data: %s\n\n", template)
|
||||||
} else if typeStr == "response.reasoning_summary_part.added" {
|
} else if typeStr == "response.reasoning_summary_part.added" {
|
||||||
template = `{"type":"content_block_start","index":0,"content_block":{"type":"thinking","thinking":""}}`
|
template = `{"type":"content_block_start","index":0,"content_block":{"type":"thinking","thinking":""}}`
|
||||||
template, _ = sjson.Set(template, "index", rootResult.Get("output_index").Int())
|
template, _ = sjson.Set(template, "index", (*param).(*ConvertCodexResponseToClaudeParams).BlockIndex)
|
||||||
|
|
||||||
output = "event: content_block_start\n"
|
output = "event: content_block_start\n"
|
||||||
output += fmt.Sprintf("data: %s\n\n", template)
|
output += fmt.Sprintf("data: %s\n\n", template)
|
||||||
} else if typeStr == "response.reasoning_summary_text.delta" {
|
} else if typeStr == "response.reasoning_summary_text.delta" {
|
||||||
template = `{"type":"content_block_delta","index":0,"delta":{"type":"thinking_delta","thinking":""}}`
|
template = `{"type":"content_block_delta","index":0,"delta":{"type":"thinking_delta","thinking":""}}`
|
||||||
template, _ = sjson.Set(template, "index", rootResult.Get("output_index").Int())
|
template, _ = sjson.Set(template, "index", (*param).(*ConvertCodexResponseToClaudeParams).BlockIndex)
|
||||||
template, _ = sjson.Set(template, "delta.thinking", rootResult.Get("delta").String())
|
template, _ = sjson.Set(template, "delta.thinking", rootResult.Get("delta").String())
|
||||||
|
|
||||||
output = "event: content_block_delta\n"
|
output = "event: content_block_delta\n"
|
||||||
output += fmt.Sprintf("data: %s\n\n", template)
|
output += fmt.Sprintf("data: %s\n\n", template)
|
||||||
} else if typeStr == "response.reasoning_summary_part.done" {
|
} else if typeStr == "response.reasoning_summary_part.done" {
|
||||||
template = `{"type":"content_block_stop","index":0}`
|
template = `{"type":"content_block_stop","index":0}`
|
||||||
template, _ = sjson.Set(template, "index", rootResult.Get("output_index").Int())
|
template, _ = sjson.Set(template, "index", (*param).(*ConvertCodexResponseToClaudeParams).BlockIndex)
|
||||||
|
(*param).(*ConvertCodexResponseToClaudeParams).BlockIndex++
|
||||||
|
|
||||||
output = "event: content_block_stop\n"
|
output = "event: content_block_stop\n"
|
||||||
output += fmt.Sprintf("data: %s\n\n", template)
|
output += fmt.Sprintf("data: %s\n\n", template)
|
||||||
|
|
||||||
} else if typeStr == "response.content_part.added" {
|
} else if typeStr == "response.content_part.added" {
|
||||||
template = `{"type":"content_block_start","index":0,"content_block":{"type":"text","text":""}}`
|
template = `{"type":"content_block_start","index":0,"content_block":{"type":"text","text":""}}`
|
||||||
template, _ = sjson.Set(template, "index", rootResult.Get("output_index").Int())
|
template, _ = sjson.Set(template, "index", (*param).(*ConvertCodexResponseToClaudeParams).BlockIndex)
|
||||||
|
|
||||||
output = "event: content_block_start\n"
|
output = "event: content_block_start\n"
|
||||||
output += fmt.Sprintf("data: %s\n\n", template)
|
output += fmt.Sprintf("data: %s\n\n", template)
|
||||||
} else if typeStr == "response.output_text.delta" {
|
} else if typeStr == "response.output_text.delta" {
|
||||||
template = `{"type":"content_block_delta","index":0,"delta":{"type":"text_delta","text":""}}`
|
template = `{"type":"content_block_delta","index":0,"delta":{"type":"text_delta","text":""}}`
|
||||||
template, _ = sjson.Set(template, "index", rootResult.Get("output_index").Int())
|
template, _ = sjson.Set(template, "index", (*param).(*ConvertCodexResponseToClaudeParams).BlockIndex)
|
||||||
template, _ = sjson.Set(template, "delta.text", rootResult.Get("delta").String())
|
template, _ = sjson.Set(template, "delta.text", rootResult.Get("delta").String())
|
||||||
|
|
||||||
output = "event: content_block_delta\n"
|
output = "event: content_block_delta\n"
|
||||||
output += fmt.Sprintf("data: %s\n\n", template)
|
output += fmt.Sprintf("data: %s\n\n", template)
|
||||||
} else if typeStr == "response.content_part.done" {
|
} else if typeStr == "response.content_part.done" {
|
||||||
template = `{"type":"content_block_stop","index":0}`
|
template = `{"type":"content_block_stop","index":0}`
|
||||||
template, _ = sjson.Set(template, "index", rootResult.Get("output_index").Int())
|
template, _ = sjson.Set(template, "index", (*param).(*ConvertCodexResponseToClaudeParams).BlockIndex)
|
||||||
|
(*param).(*ConvertCodexResponseToClaudeParams).BlockIndex++
|
||||||
|
|
||||||
output = "event: content_block_stop\n"
|
output = "event: content_block_stop\n"
|
||||||
output += fmt.Sprintf("data: %s\n\n", template)
|
output += fmt.Sprintf("data: %s\n\n", template)
|
||||||
} else if typeStr == "response.completed" {
|
} else if typeStr == "response.completed" {
|
||||||
template = `{"type":"message_delta","delta":{"stop_reason":"tool_use","stop_sequence":null},"usage":{"input_tokens":0,"output_tokens":0}}`
|
template = `{"type":"message_delta","delta":{"stop_reason":"tool_use","stop_sequence":null},"usage":{"input_tokens":0,"output_tokens":0}}`
|
||||||
p := (*param).(*bool)
|
p := (*param).(*ConvertCodexResponseToClaudeParams).HasToolCall
|
||||||
if *p {
|
if p {
|
||||||
template, _ = sjson.Set(template, "delta.stop_reason", "tool_use")
|
template, _ = sjson.Set(template, "delta.stop_reason", "tool_use")
|
||||||
} else {
|
} else {
|
||||||
template, _ = sjson.Set(template, "delta.stop_reason", "end_turn")
|
template, _ = sjson.Set(template, "delta.stop_reason", "end_turn")
|
||||||
@@ -118,10 +129,9 @@ func ConvertCodexResponseToClaude(_ context.Context, _ string, originalRequestRa
|
|||||||
itemResult := rootResult.Get("item")
|
itemResult := rootResult.Get("item")
|
||||||
itemType := itemResult.Get("type").String()
|
itemType := itemResult.Get("type").String()
|
||||||
if itemType == "function_call" {
|
if itemType == "function_call" {
|
||||||
p := true
|
(*param).(*ConvertCodexResponseToClaudeParams).HasToolCall = true
|
||||||
*param = &p
|
|
||||||
template = `{"type":"content_block_start","index":0,"content_block":{"type":"tool_use","id":"","name":"","input":{}}}`
|
template = `{"type":"content_block_start","index":0,"content_block":{"type":"tool_use","id":"","name":"","input":{}}}`
|
||||||
template, _ = sjson.Set(template, "index", rootResult.Get("output_index").Int())
|
template, _ = sjson.Set(template, "index", (*param).(*ConvertCodexResponseToClaudeParams).BlockIndex)
|
||||||
template, _ = sjson.Set(template, "content_block.id", itemResult.Get("call_id").String())
|
template, _ = sjson.Set(template, "content_block.id", itemResult.Get("call_id").String())
|
||||||
{
|
{
|
||||||
// Restore original tool name if shortened
|
// Restore original tool name if shortened
|
||||||
@@ -137,7 +147,7 @@ func ConvertCodexResponseToClaude(_ context.Context, _ string, originalRequestRa
|
|||||||
output += fmt.Sprintf("data: %s\n\n", template)
|
output += fmt.Sprintf("data: %s\n\n", template)
|
||||||
|
|
||||||
template = `{"type":"content_block_delta","index":0,"delta":{"type":"input_json_delta","partial_json":""}}`
|
template = `{"type":"content_block_delta","index":0,"delta":{"type":"input_json_delta","partial_json":""}}`
|
||||||
template, _ = sjson.Set(template, "index", rootResult.Get("output_index").Int())
|
template, _ = sjson.Set(template, "index", (*param).(*ConvertCodexResponseToClaudeParams).BlockIndex)
|
||||||
|
|
||||||
output += "event: content_block_delta\n"
|
output += "event: content_block_delta\n"
|
||||||
output += fmt.Sprintf("data: %s\n\n", template)
|
output += fmt.Sprintf("data: %s\n\n", template)
|
||||||
@@ -147,14 +157,15 @@ func ConvertCodexResponseToClaude(_ context.Context, _ string, originalRequestRa
|
|||||||
itemType := itemResult.Get("type").String()
|
itemType := itemResult.Get("type").String()
|
||||||
if itemType == "function_call" {
|
if itemType == "function_call" {
|
||||||
template = `{"type":"content_block_stop","index":0}`
|
template = `{"type":"content_block_stop","index":0}`
|
||||||
template, _ = sjson.Set(template, "index", rootResult.Get("output_index").Int())
|
template, _ = sjson.Set(template, "index", (*param).(*ConvertCodexResponseToClaudeParams).BlockIndex)
|
||||||
|
(*param).(*ConvertCodexResponseToClaudeParams).BlockIndex++
|
||||||
|
|
||||||
output = "event: content_block_stop\n"
|
output = "event: content_block_stop\n"
|
||||||
output += fmt.Sprintf("data: %s\n\n", template)
|
output += fmt.Sprintf("data: %s\n\n", template)
|
||||||
}
|
}
|
||||||
} else if typeStr == "response.function_call_arguments.delta" {
|
} else if typeStr == "response.function_call_arguments.delta" {
|
||||||
template = `{"type":"content_block_delta","index":0,"delta":{"type":"input_json_delta","partial_json":""}}`
|
template = `{"type":"content_block_delta","index":0,"delta":{"type":"input_json_delta","partial_json":""}}`
|
||||||
template, _ = sjson.Set(template, "index", rootResult.Get("output_index").Int())
|
template, _ = sjson.Set(template, "index", (*param).(*ConvertCodexResponseToClaudeParams).BlockIndex)
|
||||||
template, _ = sjson.Set(template, "delta.partial_json", rootResult.Get("delta").String())
|
template, _ = sjson.Set(template, "delta.partial_json", rootResult.Get("delta").String())
|
||||||
|
|
||||||
output += "event: content_block_delta\n"
|
output += "event: content_block_delta\n"
|
||||||
|
|||||||
@@ -275,7 +275,15 @@ func ConvertOpenAIRequestToCodex(modelName string, inputRawJSON []byte, stream b
|
|||||||
arr := tools.Array()
|
arr := tools.Array()
|
||||||
for i := 0; i < len(arr); i++ {
|
for i := 0; i < len(arr); i++ {
|
||||||
t := arr[i]
|
t := arr[i]
|
||||||
if t.Get("type").String() == "function" {
|
toolType := t.Get("type").String()
|
||||||
|
// Pass through built-in tools (e.g. {"type":"web_search"}) directly for the Responses API.
|
||||||
|
// Only "function" needs structural conversion because Chat Completions nests details under "function".
|
||||||
|
if toolType != "" && toolType != "function" && t.IsObject() {
|
||||||
|
out, _ = sjson.SetRaw(out, "tools.-1", t.Raw)
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
|
||||||
|
if toolType == "function" {
|
||||||
item := `{}`
|
item := `{}`
|
||||||
item, _ = sjson.Set(item, "type", "function")
|
item, _ = sjson.Set(item, "type", "function")
|
||||||
fn := t.Get("function")
|
fn := t.Get("function")
|
||||||
@@ -304,6 +312,37 @@ func ConvertOpenAIRequestToCodex(modelName string, inputRawJSON []byte, stream b
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Map tool_choice when present.
|
||||||
|
// Chat Completions: "tool_choice" can be a string ("auto"/"none") or an object (e.g. {"type":"function","function":{"name":"..."}}).
|
||||||
|
// Responses API: keep built-in tool choices as-is; flatten function choice to {"type":"function","name":"..."}.
|
||||||
|
if tc := gjson.GetBytes(rawJSON, "tool_choice"); tc.Exists() {
|
||||||
|
switch {
|
||||||
|
case tc.Type == gjson.String:
|
||||||
|
out, _ = sjson.Set(out, "tool_choice", tc.String())
|
||||||
|
case tc.IsObject():
|
||||||
|
tcType := tc.Get("type").String()
|
||||||
|
if tcType == "function" {
|
||||||
|
name := tc.Get("function.name").String()
|
||||||
|
if name != "" {
|
||||||
|
if short, ok := originalToolNameMap[name]; ok {
|
||||||
|
name = short
|
||||||
|
} else {
|
||||||
|
name = shortenNameIfNeeded(name)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
choice := `{}`
|
||||||
|
choice, _ = sjson.Set(choice, "type", "function")
|
||||||
|
if name != "" {
|
||||||
|
choice, _ = sjson.Set(choice, "name", name)
|
||||||
|
}
|
||||||
|
out, _ = sjson.SetRaw(out, "tool_choice", choice)
|
||||||
|
} else if tcType != "" {
|
||||||
|
// Built-in tool choices (e.g. {"type":"web_search"}) are already Responses-compatible.
|
||||||
|
out, _ = sjson.SetRaw(out, "tool_choice", tc.Raw)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
out, _ = sjson.Set(out, "store", false)
|
out, _ = sjson.Set(out, "store", false)
|
||||||
return []byte(out)
|
return []byte(out)
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -152,7 +152,7 @@ func ConvertOpenAIRequestToGeminiCLI(modelName string, inputRawJSON []byte, _ bo
|
|||||||
role := m.Get("role").String()
|
role := m.Get("role").String()
|
||||||
content := m.Get("content")
|
content := m.Get("content")
|
||||||
|
|
||||||
if role == "system" && len(arr) > 1 {
|
if (role == "system" || role == "developer") && len(arr) > 1 {
|
||||||
// system -> request.systemInstruction as a user message style
|
// system -> request.systemInstruction as a user message style
|
||||||
if content.Type == gjson.String {
|
if content.Type == gjson.String {
|
||||||
out, _ = sjson.SetBytes(out, "request.systemInstruction.role", "user")
|
out, _ = sjson.SetBytes(out, "request.systemInstruction.role", "user")
|
||||||
@@ -169,7 +169,7 @@ func ConvertOpenAIRequestToGeminiCLI(modelName string, inputRawJSON []byte, _ bo
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
} else if role == "user" || (role == "system" && len(arr) == 1) {
|
} else if role == "user" || ((role == "system" || role == "developer") && len(arr) == 1) {
|
||||||
// Build single user content node to avoid splitting into multiple contents
|
// Build single user content node to avoid splitting into multiple contents
|
||||||
node := []byte(`{"role":"user","parts":[]}`)
|
node := []byte(`{"role":"user","parts":[]}`)
|
||||||
if content.Type == gjson.String {
|
if content.Type == gjson.String {
|
||||||
|
|||||||
@@ -170,7 +170,7 @@ func ConvertOpenAIRequestToGemini(modelName string, inputRawJSON []byte, _ bool)
|
|||||||
role := m.Get("role").String()
|
role := m.Get("role").String()
|
||||||
content := m.Get("content")
|
content := m.Get("content")
|
||||||
|
|
||||||
if role == "system" && len(arr) > 1 {
|
if (role == "system" || role == "developer") && len(arr) > 1 {
|
||||||
// system -> system_instruction as a user message style
|
// system -> system_instruction as a user message style
|
||||||
if content.Type == gjson.String {
|
if content.Type == gjson.String {
|
||||||
out, _ = sjson.SetBytes(out, "system_instruction.role", "user")
|
out, _ = sjson.SetBytes(out, "system_instruction.role", "user")
|
||||||
@@ -187,7 +187,7 @@ func ConvertOpenAIRequestToGemini(modelName string, inputRawJSON []byte, _ bool)
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
} else if role == "user" || (role == "system" && len(arr) == 1) {
|
} else if role == "user" || ((role == "system" || role == "developer") && len(arr) == 1) {
|
||||||
// Build single user content node to avoid splitting into multiple contents
|
// Build single user content node to avoid splitting into multiple contents
|
||||||
node := []byte(`{"role":"user","parts":[]}`)
|
node := []byte(`{"role":"user","parts":[]}`)
|
||||||
if content.Type == gjson.String {
|
if content.Type == gjson.String {
|
||||||
|
|||||||
@@ -163,6 +163,14 @@ func ConvertOpenAIResponsesRequestToOpenAIChatCompletions(modelName string, inpu
|
|||||||
var chatCompletionsTools []interface{}
|
var chatCompletionsTools []interface{}
|
||||||
|
|
||||||
tools.ForEach(func(_, tool gjson.Result) bool {
|
tools.ForEach(func(_, tool gjson.Result) bool {
|
||||||
|
// Built-in tools (e.g. {"type":"web_search"}) are already compatible with the Chat Completions schema.
|
||||||
|
// Only function tools need structural conversion because Chat Completions nests details under "function".
|
||||||
|
toolType := tool.Get("type").String()
|
||||||
|
if toolType != "" && toolType != "function" && tool.IsObject() {
|
||||||
|
chatCompletionsTools = append(chatCompletionsTools, tool.Value())
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
|
||||||
chatTool := `{"type":"function","function":{}}`
|
chatTool := `{"type":"function","function":{}}`
|
||||||
|
|
||||||
// Convert tool structure from responses format to chat completions format
|
// Convert tool structure from responses format to chat completions format
|
||||||
|
|||||||
@@ -21,6 +21,7 @@ type ManagementTokenRequester interface {
|
|||||||
RequestIFlowToken(*gin.Context)
|
RequestIFlowToken(*gin.Context)
|
||||||
RequestIFlowCookieToken(*gin.Context)
|
RequestIFlowCookieToken(*gin.Context)
|
||||||
GetAuthStatus(c *gin.Context)
|
GetAuthStatus(c *gin.Context)
|
||||||
|
PostOAuthCallback(c *gin.Context)
|
||||||
}
|
}
|
||||||
|
|
||||||
type managementTokenRequester struct {
|
type managementTokenRequester struct {
|
||||||
@@ -65,3 +66,7 @@ func (m *managementTokenRequester) RequestIFlowCookieToken(c *gin.Context) {
|
|||||||
func (m *managementTokenRequester) GetAuthStatus(c *gin.Context) {
|
func (m *managementTokenRequester) GetAuthStatus(c *gin.Context) {
|
||||||
m.handler.GetAuthStatus(c)
|
m.handler.GetAuthStatus(c)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func (m *managementTokenRequester) PostOAuthCallback(c *gin.Context) {
|
||||||
|
m.handler.PostOAuthCallback(c)
|
||||||
|
}
|
||||||
|
|||||||
@@ -5,6 +5,7 @@ import (
|
|||||||
"encoding/json"
|
"encoding/json"
|
||||||
"errors"
|
"errors"
|
||||||
"net/http"
|
"net/http"
|
||||||
|
"path/filepath"
|
||||||
"strconv"
|
"strconv"
|
||||||
"strings"
|
"strings"
|
||||||
"sync"
|
"sync"
|
||||||
@@ -388,22 +389,8 @@ func (m *Manager) executeWithProvider(ctx context.Context, provider string, req
|
|||||||
return cliproxyexecutor.Response{}, errPick
|
return cliproxyexecutor.Response{}, errPick
|
||||||
}
|
}
|
||||||
|
|
||||||
accountType, accountInfo := auth.AccountInfo()
|
|
||||||
proxyInfo := auth.ProxyInfo()
|
|
||||||
entry := logEntryWithRequestID(ctx)
|
entry := logEntryWithRequestID(ctx)
|
||||||
if accountType == "api_key" {
|
debugLogAuthSelection(entry, auth, provider, req.Model)
|
||||||
if proxyInfo != "" {
|
|
||||||
entry.Debugf("Use API key %s for model %s %s", util.HideAPIKey(accountInfo), req.Model, proxyInfo)
|
|
||||||
} else {
|
|
||||||
entry.Debugf("Use API key %s for model %s", util.HideAPIKey(accountInfo), req.Model)
|
|
||||||
}
|
|
||||||
} else if accountType == "oauth" {
|
|
||||||
if proxyInfo != "" {
|
|
||||||
entry.Debugf("Use OAuth %s for model %s %s", accountInfo, req.Model, proxyInfo)
|
|
||||||
} else {
|
|
||||||
entry.Debugf("Use OAuth %s for model %s", accountInfo, req.Model)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
tried[auth.ID] = struct{}{}
|
tried[auth.ID] = struct{}{}
|
||||||
execCtx := ctx
|
execCtx := ctx
|
||||||
@@ -450,22 +437,8 @@ func (m *Manager) executeCountWithProvider(ctx context.Context, provider string,
|
|||||||
return cliproxyexecutor.Response{}, errPick
|
return cliproxyexecutor.Response{}, errPick
|
||||||
}
|
}
|
||||||
|
|
||||||
accountType, accountInfo := auth.AccountInfo()
|
|
||||||
proxyInfo := auth.ProxyInfo()
|
|
||||||
entry := logEntryWithRequestID(ctx)
|
entry := logEntryWithRequestID(ctx)
|
||||||
if accountType == "api_key" {
|
debugLogAuthSelection(entry, auth, provider, req.Model)
|
||||||
if proxyInfo != "" {
|
|
||||||
entry.Debugf("Use API key %s for model %s %s", util.HideAPIKey(accountInfo), req.Model, proxyInfo)
|
|
||||||
} else {
|
|
||||||
entry.Debugf("Use API key %s for model %s", util.HideAPIKey(accountInfo), req.Model)
|
|
||||||
}
|
|
||||||
} else if accountType == "oauth" {
|
|
||||||
if proxyInfo != "" {
|
|
||||||
entry.Debugf("Use OAuth %s for model %s %s", accountInfo, req.Model, proxyInfo)
|
|
||||||
} else {
|
|
||||||
entry.Debugf("Use OAuth %s for model %s", accountInfo, req.Model)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
tried[auth.ID] = struct{}{}
|
tried[auth.ID] = struct{}{}
|
||||||
execCtx := ctx
|
execCtx := ctx
|
||||||
@@ -512,22 +485,8 @@ func (m *Manager) executeStreamWithProvider(ctx context.Context, provider string
|
|||||||
return nil, errPick
|
return nil, errPick
|
||||||
}
|
}
|
||||||
|
|
||||||
accountType, accountInfo := auth.AccountInfo()
|
|
||||||
proxyInfo := auth.ProxyInfo()
|
|
||||||
entry := logEntryWithRequestID(ctx)
|
entry := logEntryWithRequestID(ctx)
|
||||||
if accountType == "api_key" {
|
debugLogAuthSelection(entry, auth, provider, req.Model)
|
||||||
if proxyInfo != "" {
|
|
||||||
entry.Debugf("Use API key %s for model %s %s", util.HideAPIKey(accountInfo), req.Model, proxyInfo)
|
|
||||||
} else {
|
|
||||||
entry.Debugf("Use API key %s for model %s", util.HideAPIKey(accountInfo), req.Model)
|
|
||||||
}
|
|
||||||
} else if accountType == "oauth" {
|
|
||||||
if proxyInfo != "" {
|
|
||||||
entry.Debugf("Use OAuth %s for model %s %s", accountInfo, req.Model, proxyInfo)
|
|
||||||
} else {
|
|
||||||
entry.Debugf("Use OAuth %s for model %s", accountInfo, req.Model)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
tried[auth.ID] = struct{}{}
|
tried[auth.ID] = struct{}{}
|
||||||
execCtx := ctx
|
execCtx := ctx
|
||||||
@@ -1626,6 +1585,66 @@ func logEntryWithRequestID(ctx context.Context) *log.Entry {
|
|||||||
return log.NewEntry(log.StandardLogger())
|
return log.NewEntry(log.StandardLogger())
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func debugLogAuthSelection(entry *log.Entry, auth *Auth, provider string, model string) {
|
||||||
|
if !log.IsLevelEnabled(log.DebugLevel) {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if entry == nil || auth == nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
accountType, accountInfo := auth.AccountInfo()
|
||||||
|
proxyInfo := auth.ProxyInfo()
|
||||||
|
suffix := ""
|
||||||
|
if proxyInfo != "" {
|
||||||
|
suffix = " " + proxyInfo
|
||||||
|
}
|
||||||
|
switch accountType {
|
||||||
|
case "api_key":
|
||||||
|
entry.Debugf("Use API key %s for model %s%s", util.HideAPIKey(accountInfo), model, suffix)
|
||||||
|
case "oauth":
|
||||||
|
ident := formatOauthIdentity(auth, provider, accountInfo)
|
||||||
|
entry.Debugf("Use OAuth %s for model %s%s", ident, model, suffix)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func formatOauthIdentity(auth *Auth, provider string, accountInfo string) string {
|
||||||
|
if auth == nil {
|
||||||
|
return ""
|
||||||
|
}
|
||||||
|
authIndex := auth.EnsureIndex()
|
||||||
|
// Prefer the auth's provider when available.
|
||||||
|
providerName := strings.TrimSpace(auth.Provider)
|
||||||
|
if providerName == "" {
|
||||||
|
providerName = strings.TrimSpace(provider)
|
||||||
|
}
|
||||||
|
// Only log the basename to avoid leaking host paths.
|
||||||
|
// FileName may be unset for some auth backends; fall back to ID.
|
||||||
|
authFile := strings.TrimSpace(auth.FileName)
|
||||||
|
if authFile == "" {
|
||||||
|
authFile = strings.TrimSpace(auth.ID)
|
||||||
|
}
|
||||||
|
if authFile != "" {
|
||||||
|
authFile = filepath.Base(authFile)
|
||||||
|
}
|
||||||
|
parts := make([]string, 0, 3)
|
||||||
|
if providerName != "" {
|
||||||
|
parts = append(parts, "provider="+providerName)
|
||||||
|
}
|
||||||
|
if authFile != "" {
|
||||||
|
parts = append(parts, "auth_file="+authFile)
|
||||||
|
}
|
||||||
|
if authIndex != "" {
|
||||||
|
parts = append(parts, "auth_index="+authIndex)
|
||||||
|
}
|
||||||
|
if len(parts) == 0 {
|
||||||
|
return accountInfo
|
||||||
|
}
|
||||||
|
if accountInfo == "" {
|
||||||
|
return strings.Join(parts, " ")
|
||||||
|
}
|
||||||
|
return strings.Join(parts, " ") + " account=" + strconv.Quote(accountInfo)
|
||||||
|
}
|
||||||
|
|
||||||
// InjectCredentials delegates per-provider HTTP request preparation when supported.
|
// InjectCredentials delegates per-provider HTTP request preparation when supported.
|
||||||
// If the registered executor for the auth provider implements RequestPreparer,
|
// If the registered executor for the auth provider implements RequestPreparer,
|
||||||
// it will be invoked to modify the request (e.g., add headers).
|
// it will be invoked to modify the request (e.g., add headers).
|
||||||
|
|||||||
54
test/builtin_tools_translation_test.go
Normal file
54
test/builtin_tools_translation_test.go
Normal file
@@ -0,0 +1,54 @@
|
|||||||
|
package test
|
||||||
|
|
||||||
|
import (
|
||||||
|
"testing"
|
||||||
|
|
||||||
|
_ "github.com/router-for-me/CLIProxyAPI/v6/internal/translator"
|
||||||
|
|
||||||
|
sdktranslator "github.com/router-for-me/CLIProxyAPI/v6/sdk/translator"
|
||||||
|
"github.com/tidwall/gjson"
|
||||||
|
)
|
||||||
|
|
||||||
|
func TestOpenAIToCodex_PreservesBuiltinTools(t *testing.T) {
|
||||||
|
in := []byte(`{
|
||||||
|
"model":"gpt-5",
|
||||||
|
"messages":[{"role":"user","content":"hi"}],
|
||||||
|
"tools":[{"type":"web_search","search_context_size":"high"}],
|
||||||
|
"tool_choice":{"type":"web_search"}
|
||||||
|
}`)
|
||||||
|
|
||||||
|
out := sdktranslator.TranslateRequest(sdktranslator.FormatOpenAI, sdktranslator.FormatCodex, "gpt-5", in, false)
|
||||||
|
|
||||||
|
if got := gjson.GetBytes(out, "tools.#").Int(); got != 1 {
|
||||||
|
t.Fatalf("expected 1 tool, got %d: %s", got, string(out))
|
||||||
|
}
|
||||||
|
if got := gjson.GetBytes(out, "tools.0.type").String(); got != "web_search" {
|
||||||
|
t.Fatalf("expected tools[0].type=web_search, got %q: %s", got, string(out))
|
||||||
|
}
|
||||||
|
if got := gjson.GetBytes(out, "tools.0.search_context_size").String(); got != "high" {
|
||||||
|
t.Fatalf("expected tools[0].search_context_size=high, got %q: %s", got, string(out))
|
||||||
|
}
|
||||||
|
if got := gjson.GetBytes(out, "tool_choice.type").String(); got != "web_search" {
|
||||||
|
t.Fatalf("expected tool_choice.type=web_search, got %q: %s", got, string(out))
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestOpenAIResponsesToOpenAI_PreservesBuiltinTools(t *testing.T) {
|
||||||
|
in := []byte(`{
|
||||||
|
"model":"gpt-5",
|
||||||
|
"input":[{"role":"user","content":[{"type":"input_text","text":"hi"}]}],
|
||||||
|
"tools":[{"type":"web_search","search_context_size":"low"}]
|
||||||
|
}`)
|
||||||
|
|
||||||
|
out := sdktranslator.TranslateRequest(sdktranslator.FormatOpenAIResponse, sdktranslator.FormatOpenAI, "gpt-5", in, false)
|
||||||
|
|
||||||
|
if got := gjson.GetBytes(out, "tools.#").Int(); got != 1 {
|
||||||
|
t.Fatalf("expected 1 tool, got %d: %s", got, string(out))
|
||||||
|
}
|
||||||
|
if got := gjson.GetBytes(out, "tools.0.type").String(); got != "web_search" {
|
||||||
|
t.Fatalf("expected tools[0].type=web_search, got %q: %s", got, string(out))
|
||||||
|
}
|
||||||
|
if got := gjson.GetBytes(out, "tools.0.search_context_size").String(); got != "low" {
|
||||||
|
t.Fatalf("expected tools[0].search_context_size=low, got %q: %s", got, string(out))
|
||||||
|
}
|
||||||
|
}
|
||||||
Reference in New Issue
Block a user